Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud

Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and re...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdulghani Ali Ahmed, Khalid Farhan, Mohd Izuan Hafez Ninggal, Ghadir Alselwi
Format: Article
Language:English
Published: MDPI AG 2024-12-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/25/1/106
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841548898311602176
author Abdulghani Ali Ahmed
Khalid Farhan
Mohd Izuan Hafez Ninggal
Ghadir Alselwi
author_facet Abdulghani Ali Ahmed
Khalid Farhan
Mohd Izuan Hafez Ninggal
Ghadir Alselwi
author_sort Abdulghani Ali Ahmed
collection DOAJ
description Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification. In the artefacts collection stage, the proposed technique determines the location of the artefacts in cloud storage and collects them for further investigation in the next stage. In the evidence identification stage, the collected artefacts are investigated to identify the evidence relevant to the cybercrime currently being investigated. These two stages perform an integrated process for mitigating the difficulty of locating the artefacts and reducing the time of identifying the relevant evidence. The proposed technique is implemented and tested by applying a forensics investigation algorithm on Sync.com cloud storage using the Microsoft Windows 10 operating system.
format Article
id doaj-art-1757b5b097fd4b15a96e11a70c65807e
institution Kabale University
issn 1424-8220
language English
publishDate 2024-12-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj-art-1757b5b097fd4b15a96e11a70c65807e2025-01-10T13:20:53ZengMDPI AGSensors1424-82202024-12-0125110610.3390/s25010106Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com CloudAbdulghani Ali Ahmed0Khalid Farhan1Mohd Izuan Hafez Ninggal2Ghadir Alselwi3School of Computer Science and Informatics, Faculty of Computing, Engineering and Media, De Montfort University, Leicester LE1 9BH, UKSchool of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, AustraliaFaculty of Computer Science & Information Technology, Universiti Putra Malaysia, Serdang, Selangor 43400, MalaysiaSchool of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, AustraliaMost current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification. In the artefacts collection stage, the proposed technique determines the location of the artefacts in cloud storage and collects them for further investigation in the next stage. In the evidence identification stage, the collected artefacts are investigated to identify the evidence relevant to the cybercrime currently being investigated. These two stages perform an integrated process for mitigating the difficulty of locating the artefacts and reducing the time of identifying the relevant evidence. The proposed technique is implemented and tested by applying a forensics investigation algorithm on Sync.com cloud storage using the Microsoft Windows 10 operating system.https://www.mdpi.com/1424-8220/25/1/106cloud forensicscloud company servicesweb browserSync.com clouddigital forensiccyber investigation
spellingShingle Abdulghani Ali Ahmed
Khalid Farhan
Mohd Izuan Hafez Ninggal
Ghadir Alselwi
Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
Sensors
cloud forensics
cloud company services
web browser
Sync.com cloud
digital forensic
cyber investigation
title Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
title_full Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
title_fullStr Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
title_full_unstemmed Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
title_short Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
title_sort retrieving and identifying remnants of artefacts on local devices using sync com cloud
topic cloud forensics
cloud company services
web browser
Sync.com cloud
digital forensic
cyber investigation
url https://www.mdpi.com/1424-8220/25/1/106
work_keys_str_mv AT abdulghanialiahmed retrievingandidentifyingremnantsofartefactsonlocaldevicesusingsynccomcloud
AT khalidfarhan retrievingandidentifyingremnantsofartefactsonlocaldevicesusingsynccomcloud
AT mohdizuanhafezninggal retrievingandidentifyingremnantsofartefactsonlocaldevicesusingsynccomcloud
AT ghadiralselwi retrievingandidentifyingremnantsofartefactsonlocaldevicesusingsynccomcloud